Network attack identification method, system and device, terminal equipment and storage medium

A technology of attacking terminals and network attacks, which is applied in the field of network security, can solve problems such as high cost, low accuracy, and low efficiency, and achieve the effect of solving intelligent identification problems

Pending Publication Date: 2022-03-01
CHINA MERCHANTS BANK
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the face of messy and changeable attack data, there are problems such as high cost, low efficiency, and low accuracy for group collection in a manual way.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack identification method, system and device, terminal equipment and storage medium
  • Network attack identification method, system and device, terminal equipment and storage medium
  • Network attack identification method, system and device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0066] The main solution of the embodiment of the present invention is: by acquiring the attack data of each attack terminal; performing dynamic behavior correlation analysis on the attack data of each attack terminal to obtain the dynamic behavior correlation analysis result of each attack terminal; Perform relational logic operations on the dynamic behavior correlation analysis results of each attacking terminal to obtain the dynamic behavior correlation degree of each attacking terminal; perform static attribute correlation analysis on the attack data of each attacking terminal to obtain the static attributes of each attacking terminal Correlation degree, using the dynamic behavior correlation degree and static attribute correlation degree as the correlation analysis result of each attacking terminal; inputting the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack identification method, system and device, terminal equipment and a storage medium. The network attack identification method comprises the following steps: acquiring attack data of each attack terminal; performing dynamic behavior association analysis and static attribute association analysis on the attack data of each attack terminal according to a pre-configured analysis strategy to obtain an association analysis result of each attack terminal; and inputting the association analysis result of each attack terminal into a preset community discovery algorithm for community collection, and determining a network attack source. According to the invention, the intelligent identification problem of the network attack source is solved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network attack identification method, system, device, terminal equipment and storage medium. Background technique [0002] At present, most of the attacks launched by criminals on Internet applications are in the form of gangs. During this process, the server can often obtain a large amount of data generated by the attacks of these black and gray production gangs. These data contain the terminals of the black and gray production gangs. , IP, attack mode and other valuable information can be used to take corresponding countermeasures. However, in the face of messy and changeable attack data, there are problems such as high cost, low efficiency, and low accuracy for group collection using manual methods. [0003] Therefore, it is necessary to propose a solution to intelligently identify the source of network attacks. Contents of the invention [0004] The main purpose of the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1408H04L63/20H04L63/1425
Inventor 姚旺冯尚卿
Owner CHINA MERCHANTS BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products